Preview

The Issues and Constraints in Relation to the use of Business Information (Asda)

Good Essays
Open Document
Open Document
1048 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Issues and Constraints in Relation to the use of Business Information (Asda)
The Issues and Constraints in Relation to the use of Business Information in Asda

In this assignment I will be explaining the issues and constraints in relation to the use of business information in Asda. I will be outlining the operational issues within the company.

Operational Issues
Asda will have different types of information. Some of their information will be more important than other information within the organisation. Asda need to ensure that the organisation receives the information it requires and that only their appropriate employees receive the information. Asda need to make sure that their information is handled properly so some policies and procedures have to be put in place. These are the following headings:
Security of information
• Backups
• Health and Safety
• Organisational policies
Business Continuance plans
• Costs

Security of information
Information needs to be secure for a business so they usually would keep their important information stored in digital format. Information security management deals with digital data. Large businesses need to make good business decisions all the time so it is important that they are able to access their important information wherever and whenever they want, so this is why large business would usually use IT systems to store their information, but as the reliance on technology increases, so does the risk posed by the system failure and malicious attacks. So businesses IT policies should take into account of the frequent dangers to their information the business relies on. This relates to Asda as they have secure login identification, so when an employee from Asda logs onto the computer they needs to put their unique username and password and they will be able to access all their they are authorised to access. Asda may also have firewalls on their system to stop hackers getting onto their own personal network. Software Asda would consider is antivirus. This stops Asda’s system from getting

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Btec Level 3 Unit 1 P1

    • 1259 Words
    • 6 Pages

    1) Write a brief introduction ASDA showing how and why the business was set up, and their operational activity in UK and abroad.…

    • 1259 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Better Essays

    M2 Unit 4

    • 1206 Words
    • 3 Pages

    M2: Analyse the legal, ethical and operational issues in relation to the use of business information and by including appropriate examples.…

    • 1206 Words
    • 3 Pages
    Better Essays
  • Good Essays

    unit2assignment

    • 757 Words
    • 4 Pages

    In parts of this assignment you will be required to refer to business information that is used in an organisation. In order to be successful it is therefore important that you choose an organisation from which you will be able to access the necessary information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Organisations have a duty to ensure the security and confidentiality of information under their control. Most organisations have policies on information security and confidentiality which go beyond the requirements of the Data Protection Act. They also have quality control procedures which staff must follow in order to keep information systems secure, accurate and updated.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    To ensure the necessary safeguards and appropriate uses of personal information are in place. For example, any issues relating to human rights, the duty of confidentiality as part of duty of care, accuracy. The information is permanent once it has been written down. The information is very personal for example, bank details, medical history and family background. This needs to be kept as confidential as possible by the manager or care workers that are recording and producing reports.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Confidentiality and information security are key factors for an organisation. It allows organisations to ensure they preserve these along with…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    unit 203 and 212

    • 1225 Words
    • 5 Pages

    2.2: an organization needs to meet requirements if it has stored any information on people, whether its paper based or electronically or information should be kept safely and stored securely. The organization should also have an access to information policy.…

    • 1225 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    209

    • 584 Words
    • 2 Pages

    Data protection Act 1998 (DPA), the purpose of this guidance to local authorities and social services is to provide information about how to keep good practice on keeping records and how to maintain those standarts. This covers eight principles under which personal data must be protected and collected. As well as advice on how to retain and dispose record safely. As well as provide guidence on how to keep records confidential.…

    • 584 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Merseytravel uses a lot of different communications to communicate with people, which includes; verbal, written, on-screen, multimedia and web-based communication. Using these five different types of communications, Merseytravel can communicate with other people using different ways to communicate which includes technology and face-to-face.…

    • 1890 Words
    • 8 Pages
    Good Essays
  • Good Essays

    It is important to have a secure protected system for all the service users because it is required by law – under the data protection act 1998 states all personal information must be kept private and secured under a lock also to not speak about any individuals outside of the office or in a public area this is done so that all service users details are protected in order to prevent identity theft.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Management have the final responsibility in ensuring information held on residents is wherever possible non-identifiable, used only when necessary and by the people who need to know and is stored securely. Most importantly that the company’s policies are adhered to and are working in relation to the handling and collecting and using and storing of information.…

    • 611 Words
    • 3 Pages
    Good Essays